syssec:final_project

SysSec Final Project!

Here is the situation…

James (@james) and Aaron (@aaron) are two entrepreneurs with a bold idea. They want to deploy “Catflix” a website that streams thousands of 4k quality cat videos. They have purchased your services, and want you to build them a network for their start-up. They need a database for their cat videos. A webserver to run their new and cool website. A Windows client to talk to customers and Windows Server with Active Directory to manage the client. They also will need a router to setup a Furwall, I mean Firewall. And lastly they will need a Linux client to SSH into the database and webserver and well Linux is cool. And you have been ​HIRED! However you only have to do some of this network, the rest they hired RIT to make.

Just like the previous assignments, we need a topology, below is an example. Depending on the route you take your topology won't be very big. Be creative!

Here is the overview of Windows(30 pts) and Linux(30 pts) setup that you will need to perform:

  • 1 Windows client (10 or 7)
  • Windows Server (2016 or 2019), this will be your Domain Controller
    • follow the Windows homework, setup the same stuff (users, groups, GPO)
  • setup MediaWiki, just like we did in the Services assignment
  • remote database and a webserver
    • Linux Client with GUI (so you can check your website)
    • database that will host data for MediaWiki
    • webserver should have Apache, MediaWiki

* pfSense as router OR Palo Alto, if you choose Palo Alto you get 20 pts of extra credit on the assignment

Use what you learned in the Risk Management lecture and Choose 5 Technical controls you learned in the Risk Management lecture and implement these into your environment. These controls must come from the CIS top 20 control list: https://www.cisecurity.org/controls/cis-controls-list/

You must submit proof of your Implementation (Screenshot is fine). In a two to three page paper summarize the 5 controls that you have implemented. In this paper please summarize the specific control, what risk(s) is being mitigated (for each control implemented), and why CatFlix will benefit from this implementation.

If you decide to implement any sort of inventory list please submit this as an excel sheet/word document with a table in it.

Examples of technical controls to implement [Controls - Evidence]:

  • Hardware Inventory list - You can just submit your topology for this. Normally this is done with a Table (Columns for the table: Asset Name, Asset Category, IP-Address, MAC Address, Operating System) (Also include NMAP output as proof)
  • Software Inventory List - Table (Columns for the table: Software Name, Software Category, Main Use, List of assets where software was implemented) - Just list any software that you installed on the system. Just list anything that is not a default app. (Example: do not list internet explorer, but list Google Chrome)
  • Controlled use of Admin Privileges- Screenshot what admins are on a particular system.
  • Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers - provide proof that you hardened a certain aspect of your system (example: SSH config file set to reject logins after X failed attempts)
  • Maintenance, Monitoring, and Analysis of Audit Logs - Provide a screenshot of 3 log files (Actually open the files)
  • etc… Reach out to Alex/Jay if you are unsure about anything!

Submit one PDF on homework.ubnetdef.org. If you have multiple PDFs you can use https://combinepdf.com/

Important:

Do not create a whole report for Part II, all we need is screenshots of…

  • the static IP on all VMs
  • LAN/WAN and DMZ configuration in pfSense or Palo Alto
  • service working and running as you did in the previous assignment, each route will be about 10 screenshots in total for all of this

As usual, if you have any questions please ask in the System Security channel!

  • syssec/final_project.1573584830.txt.gz
  • Last modified: 2019/11/12 18:53
  • by aibekzhy